Sankar et al., 2023 - Google Patents

Spoofing detection for personal voice assistants

Sankar et al., 2023

View PDF
Document ID
5561777755684230921
Author
Sankar M
De Leon P
Roedig U
Publication year

External Links

Snippet

Abstract Personal Voice Assistants (PVAs) are common acoustic sensing systems that are used as a speech-based controller for critical systems making them vulnerable to speech spoofing attacks. Prior research has focused on the discrimination of genuine and spoofed …
Continue reading at cora.ucc.ie (PDF) (other versions)

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/06Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
    • G10L15/065Adaptation
    • G10L15/07Adaptation to the speaker
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/06Decision making techniques; Pattern matching strategies
    • G10L17/10Multimodal systems, i.e. based on the integration of multiple recognition engines or fusion of expert systems
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/08Speech classification or search
    • G10L2015/088Word spotting
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/04Training, enrolment or model building
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/005Speaker recognisers specially adapted for particular applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Chen et al. Who is real bob? adversarial attacks on speaker recognition systems
Sahidullah et al. Introduction to voice presentation attack detection and recent advances
Boles et al. Voice biometrics: Deep learning-based voiceprint authentication system
Liu et al. An MFCC‐based text‐independent speaker identification system for access control
Balamurali et al. Toward robust audio spoofing detection: A detailed comparison of traditional and learned features
Han et al. Voice-indistinguishability: Protecting voiceprint in privacy-preserving speech data release
Malik et al. A light-weight replay detection framework for voice controlled IoT devices
Das et al. Long Range Acoustic Features for Spoofed Speech Detection.
Chen et al. Towards understanding and mitigating audio adversarial examples for speaker recognition
Tan et al. A survey on presentation attack detection for automatic speaker verification systems: State-of-the-art, taxonomy, issues and future direction
Arif et al. Voice spoofing countermeasure for logical access attacks detection
Dua et al. A hybrid noise robust model for multireplay attack detection in Automatic speaker verification systems
Weng et al. The sysu system for the interspeech 2015 automatic speaker verification spoofing and countermeasures challenge
Zhou et al. Voice spoofing countermeasure for voice replay attacks using deep learning
Zhang et al. Volere: Leakage resilient user authentication based on personal voice challenges
Sharma Speaker recognition using machine learning techniques
Khan et al. SpoTNet: A spoofing-aware Transformer Network for Effective Synthetic Speech Detection
Ouyang et al. Capsule network based end-to-end system for detection of replay attacks
Kuznetsov et al. Methods of countering speech synthesis attacks on voice biometric systems in banking
Nasersharif et al. Evolutionary fusion of classifiers trained on linear prediction based features for replay attack detection
Qadir et al. Voice spoofing countermeasure based on spectral features to detect synthetic attacks through LSTM
CN116665649A (en) Synthetic voice detection method based on prosody characteristics
Park et al. User authentication method via speaker recognition and speech synthesis detection
Chaiwongyen et al. Contribution of timbre and shimmer features to deepfake speech detection
Sankar et al. Spoofing detection for personal voice assistants